2016
DOI: 10.1007/978-3-319-48965-0_48
|View full text |Cite
|
Sign up to set email alerts
|

Distance Bounding Based on PUF

Abstract: Abstract. Distance Bounding (DB) is designed to mitigate relay attacks. This paper provides a complete study of the DB protocol of Kleber et al. based on Physical Unclonable Functions (PUFs). We contradict the claim that it resists to Terrorist Fraud (TF). We propose some slight modifications to increase the security of the protocol and formally prove TF-resistance, as well as resistance to Distance Fraud (DF), and Man-In-the-Middle attacks (MiM) which include relay attacks.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
4
1
1

Relationship

1
5

Authors

Journals

citations
Cited by 7 publications
(2 citation statements)
references
References 27 publications
0
2
0
Order By: Relevance
“…There are different proposals to address this problem mainly based on hardware encryption such as Physical Unclonable Functions (PUFs). These make use of the random differences of the integrated circuits in the fabrication process to generate unique vital information [21] this introduces changes in the physical process, temperature gradients among other factors that make these functions unclonable. In such a way that in the face of different challenge inputs the PUF is able to map an unpredictable and unique response [18].…”
Section: Related Workmentioning
confidence: 99%
“…There are different proposals to address this problem mainly based on hardware encryption such as Physical Unclonable Functions (PUFs). These make use of the random differences of the integrated circuits in the fabrication process to generate unique vital information [21] this introduces changes in the physical process, temperature gradients among other factors that make these functions unclonable. In such a way that in the face of different challenge inputs the PUF is able to map an unpredictable and unique response [18].…”
Section: Related Workmentioning
confidence: 99%
“…Two DB protocols [25,28] use physically uncloneable functions (PUFs) instead. The advantage is that, contrary to a cryptographic key, a PUF is designed to be untransferable.…”
Section: Disrupting Classical Assumptionsmentioning
confidence: 99%